country
$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Cyber Security Smart Survey And Challenges

tag 0 Download10 Pages / 2,462 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT

Questions:

What Is The Impact Of Cyber-Security Challenges On The Business?

What Strategies Can Be Developed To Deal With Cyber-Attacks?

 

Answers:

Introduction

The proposed research is based on the challenges and issues observed in cyber security for the business in the recent time. It has been observed that businesses are now fully depended on the technology, which means that due to the technological advancement, the ways of leading the business in a dynamic environment has become quite easy for the marketers. However, even though, the technology plays a big role in today’s modern business, due to the loophole in the technologies, the businesses often face external threats –such as stealing valuable information, anonymous access to bank accounts or organization’s official sites and other cyber attacks. According to Aloul et al., (2012) ICT devices as well as elements are largely interdependent and disrupt of one could affect many others. The Information Technology experts and the policy makers have expressed their concern regarding the protection of businesses from the cyber attacks. Here, the acts of protecting the ICT system as well as their contents are considered as cyber security.

In this report, a detail about the proposed research has been discussed elaborately. The report presents the idea how the research is going to be conducted. The report provides the project scope, which includes the determining and documenting a list of particular project goals, features, tasks, deadline and other significant factors. Likewise, the report also includes the key objectives of the proposed research. Considering the background to the research, the research questions and objectives have been provided in this report. Furthermore, the research report also includes a set of research techniques that will be applied to the proposed study.

 

Background to research

Several studies have been conducted to learn the impact of the issues related to cyber-security on businesses.  The current scenario indicates that the marketers rush to implement all policies related to cyber security to protect their business from the external threats. It is observed that the federal role in cyber security includes both securing federal system as well as assisting in preserving the non-federal systems. A study conducted by Busch and Givens (2012) mentioned that protecting the valuable intellectual property as well as the business information in the digital form against the theft as well as misuse remains as the critical management issue.  Dunn Cavelty (2013) indicated in their study that organization must have to fend off the regular cyber-attacks and the threats of cyber criminal. Dumitras and Neamtiu,  (2011) mentioned that sophisticated organizations have recently endured the public breaches to their technological environment and many incidents went unreported but the marketers are not eager to advertise or describe the vulnerabilities. On the other side, the study conducted by Liu et al.  (2012), mentioned that most large organizations have gradually reinforced their cyber security capabilities over the past few years. Nonetheless, due to this argumentative outcome, the present study observes the importance of conducting an investigation on cyber security challenge and its impact on the businesses.

Project Scope

Understanding the importance of examining the impact of cyber-security on business, the proposed research has been framed with a primary analysis. This will help to conduct the analysis with the practical evidences. The proposed study abandons the secondary analysis because the research might not provide an authentic outcome that is related to the real-world context. In order to conduct a primary analysis, an organization- Australian National Bank will be considered as the case study organization in the proposed study.  Moreover, the proposed study also focuses on the existing studies conducted on the same topic. In order to conduct the literature review, 20 journals have been considered and hence, the analysis will help to find out the gaps in the previous studies. In addition to this, to collect the primary data, a survey and interview will be conducted among the employees and senior executives of Australian National Bank. However, the research is restricted to primary analysis only, any sort thematic and comparative analysis will not be included in the proposed study. Eventually, a research time line has been provided in the following, which shows how the research has been scheduled to be conducted.

Project Objectives and aim

The major aim of the study is to examine the impact of cyber-security challenges and issues on the business organizations. The following are the key objectives of the research:

  • To critically investigate the impact of cyber security challenges on the business
  • To critically understand the importance of protecting the business information from the cyber attacks
  • To develop suitable strategies to resolve the cyber-security issues
 

Research Hypotheses

H0-Cyber security challenges have no impact on the businesses

H1- Cyber security challenges have impact on the businesses

Literature Review

Many studies have been conducted on cyber security challenges and their impact on the businesses. Each study has been framed with variety of requirements and techniques; thereby, the outcome of the study came out to be different.  The study conducted by Bonaci et al., (2015) mentioned that as the technology is continuously growing to develop, the opportunities and challenges also come out. However, as the society that runs widely on the technology, the business, as the consequences are dependent on it. The technology also brings the greater threats. According to Wang and Lu (2013), by the very nature of the opportunities, the technology presents, the technology becomes a focal point for the cyber –attacks and threats. Sridhar, Hahn and Govindarasu (2012) particularly focused on the threats of data manipulation, identify theft and cyber-warfare that have a strong impact on the businesses.

Moreover, the studies claim that as the world environment transitions large amount of products and service online, the people in turn depend on them. Protecting this technology infrastructure has now become a fundamental building block for the information system internationally. It is understood that existing studies have focused on the type of threats and attacks occurred in the businesses through the technological adoption but the studies have hardly provided any relevant outcome in terms of the strategies. However, an in-depth literature review will be conducted considering 20 different journals conducted on the present topic.

Research Methodology

Research methodology determines the outcome of the study, which means the implementation of the techniques determine the result of the study. In order to conduct the proposed study, appropriate primary research techniques will be applied to the study. The type of methods will be applied to the study has been discussed in the following.

Data collection methods

The data collection is usually divided into two different categories primary and secondary data collection.

Primary data collection- The primary data collection method is categorized into two different groups such quantitative and qualitative data collection.  It is observed that quantitative data collection techniques are based in mathematical calculation in different formats.  In the proposed study, the primary data collection techniques include the questionnaire with the close-ended questions such as the method of correlation, mean, mode, median and others. On the contrary, the qualitative research method does not consist of number and mathematical calculation and this method is rather related to emotion, sounds, voices and other relevant elements. This research methodology focuses on the level of depth of understanding. In the proposed study, the quantitative data collection involves the survey method, which will be conducted among the employees of Australian National Bank. Conversely, for collecting qualitative data, interview method will be applied to the proposed study.  However, for conducting the survey and interview, a particular sampling method will be applied, which is discussed in the following.

Secondary data- The secondary data will be used for conducting the literature review in the proposed study. Almost 20 journals have been selected for conducting the literature review.  The secondary data will be collected from the journals, books, blogs, newsletter, annual report and other reliable secondary sources.  Apart from the collection of data, reliability and validity of the papers will also be checked.

Sampling method

As put forward by Babbie (2010), sampling can be described as the particular principle applied to make the choices of members of population to be included in the research. It is also appropriately noted that as many population interest are very large to work directly. It can be mentioned that because of the brad size of target population, the studies do not have any choices besides to research a number of case elements in the population to present the population and reach the population. For the proposed study, the sampling has been categorized into two different categories such as probability and non-probability sampling. In probability sampling, every individual of the population has less or zero chance of being involved in the study. On the other side, non-probability samplings are chosen on a non-random manner; thereby, not each population member has a chance to take part in the study.

However, in the present study, both probability and non-probability sampling method will be applied. The probability sampling method will include the general employees of Australian National Bank. Hence, the employees are eligible for the survey because they do not need much knowledge about the occurrence of cyber threats and challenges and their impact on the businesses. Conversely, the non-probability sampling method will include IT executives and managers of Australian National Bank; certainly, they have much knowledge about the type of threats, attacks, thefts and other relevant technological attacks.   Thereby, the managers and the executives are the perfect the suitable individuals among all type of population. This means, the proposed study will include a mixed sampling method. The sample size for the proposed survey and interview is 100 employees and 5 managers respectively.  It is identified that reliability and validity should be tested and clarified before applying the methods to the study.

 

Research reliability and validity

As put forward by Wilson (2010) the reliability is referred to the extent to which the same response can be derived with the help of the same instruments many a time. The outcome of the proposed study will be reliable because if the analysis is made using the same interview and survey method. Therefore, in future when other researchers will conduct the research on the same topic, they could derive the same result with interview and survey methods.  In this context, Babbie (2010) mentioned that reliability revolves around the source and it is mostly associated with the subjectivity. On the contrary, the data that will be collected for analysis is validity because to conduct the research, appropriate time scale of the research along with appropriate research method will be selected. In addition, to conduct the study, the most suitable method for the research will be selected. Whenever, the study will be conducted with such similar methods, the same response will come out. Moreover, it is not possible to eliminate the threats to study’s reliability and validity but it is ensured that much effort will be put to minimize as much risk as possible.

Research Limitation

The proposed study is limited to primary analysis only; this means that no thematic and comparative analysis will be conducted in the proposed study. In addition to this, sample size for the proposed study is very constrained. The study will be conducted considering one single organization only, but the study would be more intensive, if a comparative is conducted.

Research Timeline

Main activities/ stages

Month

Aug-

Month

Sep-Dec-

Month

Jan-march-

Month

April-July-

Month

August-September-

Month

October

Topic Selection

ü     

 

 

 

 

 

Data collection from secondary sources

ü     

ü     

 

 

 

 

Framing layout of the research

 

ü     

 

 

 

 

Literature review

 

ü     

ü     

ü     

 

 

Formation of the research Plan

 

 

ü     

ü     

 

 

Selection of the Appropriate Research Techniques

 

 

 

ü     

ü     

 

Primary data collection

 

 

 

 

ü     

ü     

Analysis & Interpretation of Data Collection

 

 

 

 

ü     

ü     

Conclusion of the Study

 

 

 

 

 

ü     

Formation of Rough Draft

 

 

 

 

 

ü     

Submission of Final Work

 

 

 

 

 

ü     

Table 1: Research Timeline

 

Conclusion

In conclusion, it can be mentioned that the proposed study will provide a desired result because all relevant methods will be applied to the study. In addition to this, the literature review will help to focus on the relevant areas as previous studies have missed out several relevant factors. However, in the proposed study, those factors will be covered

 

References

Aloul, F., Al-Ali, A. R., Al-Dalky, R., Al-Mardini, M., & El-Hajj, W. (2012). Smart grid security: Threats, vulnerabilities and solutions. International Journal of Smart Grid and Clean Energy, 1(1), 1-6.

Babbie, E. R. (2010) The Practice of Social Research, Cengage Learning

Bonaci, T., Herron, J., Yusuf, T., Yan, J., Kohno, T., & Chizeck, H. J. (2015). To make a robot secure: An experimental analysis of cyber security threats against teleoperated surgical robots. arXiv preprint arXiv:1504.04339.

Busch, N. E., & Givens, A. D. (2012). Public-private partnerships in homeland security: Opportunities and challenges. Homeland Security Affairs, 8(1).

Choo, K. K. R. (2011). The cyber threat landscape: Challenges and future research directions. Computers & Security, 30(8), 719-731.

Dumitras, T., & Neamtiu, I. (2011). Experimental Challenges in Cyber Security: A Story of Provenance and Lineage for Malware. CSET, 11, 2011-9.

Dunn Cavelty, M. (2013). From cyber-bombs to political fallout: Threat representations with an impact in the cyber-security discourse. International Studies Review, 15(1), 105-122.

Line, M. B., Tøndel, I. A., & Jaatun, M. G. (2011, December). Cyber security challenges in Smart Grids. In Innovative Smart Grid Technologies (ISGT Europe), 2011 2nd IEEE PES International Conference and Exhibition on (pp. 1-8). IEEE.

Liu, J., Xiao, Y., Li, S., Liang, W., & Chen, C. P. (2012). Cyber security and privacy issues in smart grids. IEEE Communications Surveys & Tutorials, 14(4), 981-997.

O’Connell, M. E. (2012). Cyber security without cyber war. Journal of Conflict and Security Law, 17(2), 187-209.

Sridhar, S., Hahn, A., & Govindarasu, M. (2012). Cyber–physical system security for the electric power grid. Proceedings of the IEEE, 100(1), 210-224.

Wang, W., & Lu, Z. (2013). Cyber security in the Smart Grid: Survey and challenges. Computer Networks, 57(5), 1344-1371.

Wilson, J. (2010) “Essentials of Business Research: A Guide to Doing Your Research Project” SAGE Publications

OR

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2018). Cyber Security Smart Survey And Challenges. Retrieved from https://myassignmenthelp.com/free-samples/cyber-security-smart-survey-and-challenges.

"Cyber Security Smart Survey And Challenges." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/cyber-security-smart-survey-and-challenges.

My Assignment Help (2018) Cyber Security Smart Survey And Challenges [Online]. Available from: https://myassignmenthelp.com/free-samples/cyber-security-smart-survey-and-challenges
[Accessed 25 May 2020].

My Assignment Help. 'Cyber Security Smart Survey And Challenges' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/cyber-security-smart-survey-and-challenges> accessed 25 May 2020.

My Assignment Help. Cyber Security Smart Survey And Challenges [Internet]. My Assignment Help. 2018 [cited 25 May 2020]. Available from: https://myassignmenthelp.com/free-samples/cyber-security-smart-survey-and-challenges.


For years now, MyAssignmenthelp.com is providing affordable essay help to millions of students worldwide. Our essay assistance services have helped us in assisting students with even the toughest essay assignments. We take pride in the fact that we cater the best assistance to search terms like help me with my essay. We offer affordable services in the fastest way possible. For our fast delivering services, students trust us with their urgent essay assignment needs. Two of our most popular essay writing services are maths essay help and English essay help.

Latest Management Samples

MPE781 Economics For Managers 3

Download : 0 | Pages : 14

Answer: 1. The long queues represent the high demand for the given restaurant’s foods and service. The people value the restaurant high and are willing to stand in the waiting lines. The people have high opportunity cost associated with the time spent in the line. On the other hand, the restaurant with empty chairs may have high prices which make their food and services unaffordable to a large number of customers. The owner can increas...

Read More arrow

BUS703 Managing Research 3

Download : 0 | Pages : 4

Answer: Background to the problem: Failures in managing research are mainly associated with the lack of preparation in readiness for a project. This leads to businesses failing to prepare for problems leading to the projects encountering serious management hurdles (Cleden, 2017). To overcome these problems every business must address the following research issues so as to address research problems. Define business and research o...

Read More arrow

BMAC5203 Entrepreneurship For Rectifying Distinct Business Issues

Download : 0 | Pages : 15

Answer: Introduction  In the modern era, there are several organizations that are functioning in the global economy each one of the companies have been performing according to their aims and objectives. The operations of a company is dependent on the style of the entrepreneur and the ability and the mind-set of the entrepreneur determines the process that would be undertaken with the help of which the company can gain competitive edge an...

Read More arrow

SG3034 Introduction To Business And Enterprise

Download : 0 | Pages : 6
  • Course Code: SG3034
  • University: University Of East London
  • Country: United Kingdom

Answer: Introduction The Yeo Valley is one of the most widely known organic dairy firms in the UK. This company works for bringing fresh and new products for all the milk lovers. At the same time, they believe that taking care of nature is also one of the most important activities that they have to carry on. This firm has been set up by the Mead family. They have been living and working in Somerset for a long time period. They had started their...

Read More arrow

BUSN20017 Effective Buisness Communication For Tools And Analysis

Download : 0 | Pages : 18
  • Course Code: BUSN20017
  • University: Central Queensland University
  • Country: Australia

Answer: Introduction: Communication is an important aspect of business management. Every professionals need to develop proper communication skills to enjoy success at workplace mentally and financially. The assignment will first help me identify my issues in communication. Depending on it, a literature review will be conducted which will be followed by an action plan.    Tools and analysis: The first tool that I have used is the ...

Read More arrow
Next
watch

Save Time & improve Grade

Just share Requriment and get customize Solution.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,317,480

Orders

4.9/5

Overall Rating

5,074

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

647 Order Completed

98% Response Time

Adlina Han

Masters in Marketing with Specialization in Branding

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

203 Order Completed

97% Response Time

Richard Alpert

PhD in Psychology

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

2830 Order Completed

97% Response Time

Leroy Bicknell

MBA in Marketing

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

755 Order Completed

95% Response Time

Douglas Cowley

Masters in Finance with Specialization in Audit

Wellington, New Zealand

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

Great job and Great experts! The follow up and process was fantastic. Also, communication with the expert was easy.

flag

User Id: 426409 - 25 May 2020

Australia

student rating student rating student rating student rating student rating

The solution was done in time thank you do much for your efforts but please taking care for grammar is needed there was so many mistakes in grammar thank you

flag

User Id: 371975 - 25 May 2020

Australia

student rating student rating student rating student rating student rating

good to do assignment was what I expected and thanks for that one I will use him again

flag

User Id: 241498 - 25 May 2020

Australia

student rating student rating student rating student rating student rating

Great work in completing my assignment on time, was very helpful and great with communicating with the require details. will definitely use them again!

flag

User Id: 285304 - 25 May 2020

Australia

student rating student rating student rating student rating student rating
callback request mobile
Have any Query?